V. Boehme-neßler, Unscharfes Grundgesetz ? Anmerkungen zum Verfassungsrecht in der digitalisierten Welt, Institut für Wirtschaftsrecht, 60 Jahre Grundgesetz, pp.155-188, 2010.

A. Champagne, Watching over you, 2012.

J. Brodkin, Iran reportedly blocking encrypted Internet traffic, http://arstechnica.com/tech- policy/news/2012/02/iran-reportedly-blocking-encrypted-internet-traffic.ars, 2012.

K. Ingham and S. Forrest, A History and Survey of Network Firewalls, A history and survey of network firewalls, 2002.

D. N. Serpanos and T. Wolf, Architecture of network systems, 2011.

N. Anderson, Deep packet inspection meets 'Net neutrality, CALEADeep-packet-inspection-meets-net- neutrality, 2007.

I. P802, Ethernet Task Force Public Area, http://www.ieee802.org/3/ba/public/index.html 10. Ipoque, Deep packet inspection solutions for network operators

M. Liberatore and B. N. Levine, Inferring the source of encrypted HTTP connections, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.255-263, 2006.
DOI : 10.1145/1180405.1180437

R. Alshammari and A. Nur-zincir-heywood, Can encrypted traffic be identified without port number, IP addresses and payload inspection? Computer Networks, pp.1326-1350, 2010.
DOI : 10.1016/j.comnet.2010.12.002

E. Hjelmvik and W. John, Breaking and Improving Protocol Obfuscation, Dep. of Computer Science and Engineering, 2010.

A. Webb, Statistical Pattern Recognition, 2003.
DOI : 10.1002/9781119952954

N. Ipoque and . Reporter, Procera,Products, http://www.proceranetworks.com/pdf/products/overview/Procera_Overview_Brochure_me ch_2012-4-8.pdf 19. Packet Clearing House, p.0

T. T. Nguyen and G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.56-76, 2008.
DOI : 10.1109/SURV.2008.080406

R. E. Bendrath, Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, p.3, 2009.

S. Kent and . Seo, Security Architecture for the Internet Protocol, RFC, vol.4301, 2005.

T. Hoeren, ?. Analytics, and . Unbedenklich, Convention Committee on Cybercrime, Convention on Cybercrime Decision of the German Federal Constitutional Court, pp.3-6, 2010.

A. A. Gilroy, Access to Broadband Networks: The Net Neutrality Debate, CRS Report for Congress, 2011.

M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan et al., Glasnost: Enabling End Users to Detect Traffic Differentiation, Proceedings of the 7th USENIX conference on Networked systems design and implementation, 2010.

P. Kanuparthy and C. Dovrolis, DiffProbe: Detecting ISP Service Discrimination, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5461983

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.1192

S. Basso, A. Servetti, and J. C. De-martin, The network neutrality bot architecture: A preliminary approach for self-monitoring of Internet access QoS, 2011 IEEE Symposium on Computers and Communications (ISCC), pp.1131-1136, 2011.
DOI : 10.1109/ISCC.2011.5983857